Author of the publication

Lightweight IoT-based authentication scheme in cloud computing circumstance.

, , , , and . Future Gener. Comput. Syst., (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security and experimental performance analysis of a matrix ORAM., , , and . ICC, page 1-6. IEEE, (2016)A Distributed Privacy-Preserving Association Rules Mining Scheme Using Frequent-Pattern Tree., and . ADMA, volume 5139 of Lecture Notes in Computer Science, page 170-181. Springer, (2008)Improved Sparse Coding Algorithm with Device-Free Localization Technique for Intrusion Detection and Monitoring., , , , and . Symmetry, 11 (5): 637 (2019)A simple construction of encryption for a tiny domain message., , and . CISS, page 1-6. IEEE, (2017)CCBRSN: A System with High Embedding Capacity for Covert Communication in Bitcoin., and . SEC, volume 580 of IFIP Advances in Information and Communication Technology, page 324-337. Springer, (2020)Improved handover authentication and key pre-distribution for wireless mesh networks., , , and . Concurr. Comput. Pract. Exp., 28 (10): 2978-2990 (2016)Towards False Alarm Reduction Using Fuzzy If-Then Rules for Medical Cyber Physical Systems., , , and . IEEE Access, (2018)BAGKD: A Batch Authentication and Group Key Distribution Protocol for VANETs., , , , , , , , and . IEEE Commun. Mag., 58 (7): 35-41 (2020)A Novel Structure-Based Data Sharing Scheme in Cloud Computing., , , , and . IEICE Trans. Inf. Syst., 103-D (2): 222-229 (2020)A MQTT-API-compatible IoT security-enhanced platform., , , , , , , , and . Int. J. Sens. Networks, 32 (1): 54-68 (2020)